Skip to main content

Currently Skimming:

Appendix C: Coding Respondent Protocols
Pages 101-110

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 101...
... To avoid the introduction of bias into the final analysis, the respondent protocols were not used in this step. After the categories had beer defined, and various codes developed under each category, a small sample, 10, of the respondent protocols was taken to check the adequacy of the coding proceclure.
From page 102...
... These ten protocols could not be thrown out of the sample, although the special treatment given to them may have introduced some minimal bias into the results. The coders independently coded sets of five protocols.
From page 103...
... Age Disaster-Related Job Fled as a Function of Rumor Location When Heard False Report Attitude T award Red Cro s s Schooli ng Previous Disaster Experience Expo s ed to Previous Rumor s Attitude Toward Fire Dept. When Flood Victims Stayed in Home A A A A A A A A A A A A A B A A A B B A A B B A Reliabilities for the three threat and denial messages were computed together.
From page 104...
... ~ nor ren1: 104 Group with Re spondent - Strange r s Denial Communi c ation Activity when Heard False Report Total Denial Sources Threat Content Damage by Flood Group with Respondent - Farnily Attitude T o war d O the r Or our s Source anti '_ ., ~ 1 Channel of Threat Group worn Re spondent - Neighbo r s Time Re spondent Heard Fal se Repo rt Communication with Family Estimated Time Until Inundation C onfir mation Channel Re actions of Othe r s Attitude Toward Civil Defense Speed of Flight Attitude Toward Unspecified Groups ~_ ~.
From page 105...
... The punch operator can quickly and accurately punch and verify codes recorded in thi s fashion. ANALY ZING THE KEY INTERVIE WS Because of the varied nature of the key interviews, and because a different type of information was desired, it was impos sible to use the same set clef codes for their analysis as for the respondent protocols.
From page 106...
... Please do not mark the protocols themselves in any way. The only place you are to make any notations is on the coding sheets themselves.
From page 107...
... Se coed, we are di stingui shing among various types of official sources: impersonal, central, and personal official. The code "Impersonal Official" refers to such sources as the fire-truck loudspeaker, the radio, or television.
From page 108...
... Impersonal official -- radio or television 3. Central official -- word of mouth communication fro civil defense, police, fire, etc., at a communica tions center .
From page 109...
... Attitude re Red Cro s s 68. Attitude re Other Group s 69.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.